If you read RFC 5246 Chapter 7.4.2 you'll find that:
certificate_list
This is a sequence (chain) of certificates. The sender's
certificate MUST come first in the list. Each following
certificate MUST directly certify the one preceding it. Because
certificate validation requires that root keys be distributed
independently, the self-signed certificate that specifies the root
certificate authority MAY be omitted from the chain, under the
assumption that the remote end must already possess it in order to
validate it in any case.
explains it quite well. Whether the server actually does that depends on the way the system admin has configured it. Many badly configured servers 'get away' without doing the above due to the fact that many clients can fetch their CA certificates using the URL provided in the AIA extension.
Many clients also cache the certificates that they receive/download so as to reduce the burden of fetching every time they chain build. Chrome on Windows uses Microsoft's CAPI to manage its certificates (the same as IE) which does cache certificates. Chrome on Linux/OSX uses Mozilla's NSS to manage its certificates which also cache certificates. So chances are that if you've used your website online, all superior CA certificates will be cached on your system and going 'offline' will work (for a while anyway).
However, some CAs use OCSP for revocation checking. If you're offline, then the OCSP client cannot contact the OCSP responder for revocation information. What happens in that scenario depends on the configuration of your client software. By default, most browsers 'soft fail' - that is, they ignore the fact that an OCSP responder can't be contacted and assume everything is OK. Some can be configured to 'hard fail' where they will fail revocation checks if the OCSP responder cannot be contacted.